From autonotify at us.ibm.com Wed Oct 1 02:34:11 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Wed, 1 Oct 2014 02:34:11 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201410010934.s919YCvv000503@d01av04.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 605 Published: Tue, 30 Sep 2014 11:34:12 GMT New Fixlets: ============ *************************************************************** Title: UPDATE: Microsoft .NET Framework 4.5 Available - Windows 7 SP1 / Windows 2008 SP2 / Windows 2008 R2 SP1 / Windows Vista SP2 (Japanese) Severity: N/A Fixlet ID: 45001 Fixlet Link: http://www.microsoft.com/downloads/details.aspx?FamilyID=2aff3c20-50b8-4c84-9a80-0a321545c1bc Fixlet Description: The .NET Framework 4.5 is a highly compatible, in-place update to the .NET Framework 4. By using the .NET Framework 4.5 together with the C#, Visual Basic, or F# programming language, you can write Windows apps. The .NET Framework 4.5 includes significant language and framework enhancements for C#, Visual Basic, and F# (so that you can more easily write asynchronous code), the blending of control flow in synchronous code, a responsive UI, and web app scalability . The .NET Framework 4.5 adds substantial improvements to other functional areas such as ASP.NET, Managed Extensibility Framework, Windows Communication Foundation, Windows Workflow Foundation, and Windows Identity Foundation. The .NET Framework 4.5 delivers better performance, reliability, and security. For more information about these and other features of the .NET Framework 4.5, see the .NET Framework Developer Center website. *************************************************************** Title: UPDATE: Microsoft .NET Framework 4.5.1 Available - Windows Vista SP2 / Windows 7 SP1 / Windows 8 / Windows Server 2008 SP2 / Windows Server 2008 R2 SP1 / Windows Server 2012 (Japanese) Severity: N/A Fixlet ID: 45101 Fixlet Link: http://support2.microsoft.com/kb/2858728 Fixlet Description: The Microsoft .NET Framework 4.5.1 is a highly compatible, in-place update to the Microsoft .NET Framework 4 and the Microsoft .NET Framework 4.5. The offline package can be used in situations where the web installer cannot be used due to lack of internet connectivity. *************************************************************** Title: UPDATE: Microsoft .NET Framework 4.5.2 Available - Windows Vista SP2 / Windows 7 SP1 / Windows 8 / Windows 8.1 / Windows Server 2008 SP2 / Windows Server 2008 R2 SP1 / Windows Server 2012 / Windows Server 2012 R2 (Japanese) Severity: N/A Fixlet ID: 452001 Fixlet Link: http://support2.microsoft.com/kb/2901907 Fixlet Description: The Microsoft .NET Framework 4.5.2 is a highly compatible, in-place update to the Microsoft .NET Framework 4, Microsoft .NET Framework 4.5 and Microsoft .NET Framework 4.5.1. The offline package can be used in situations where the web installer cannot be used due to lack of internet connectivity. *************************************************************** Title: 2506928: A link in an .html file that you open in Outlook does not work in Windows 7 or in Windows Server 2008 R2 - Windows Server 2008 R2 Gold / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 250692801 Fixlet Link: http://support.microsoft.com/kb/2506928 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2506928: A link in an .html file that you open in Outlook does not work in Windows 7 or in Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 250692803 Fixlet Link: http://support.microsoft.com/kb/2506928 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2506928: A link in an .html file that you open in Outlook does not work in Windows 7 or in Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 250692807 Fixlet Link: http://support.microsoft.com/kb/2506928 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2515325: Windows Explorer may crash in Windows 7 or in Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 251532501 Fixlet Link: http://support.microsoft.com/kb/2515325 Fixlet Description: This is a reliability update. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2515325: Windows Explorer may crash in Windows 7 or in Windows Server 2008 R2 - Windows Server 2008 R2 Gold / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 251532505 Fixlet Link: http://support.microsoft.com/kb/2515325 Fixlet Description: This is a reliability update. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2515325: Windows Explorer may crash in Windows 7 or in Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 251532507 Fixlet Link: http://support.microsoft.com/kb/2515325 Fixlet Description: This is a reliability update. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2545698: Text in some core fonts appears blurred in Internet Explorer 9 on a computer that is running Windows Vista, Windows Server 2008, Windows 7, or Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 254569801 Fixlet Link: http://support.microsoft.com/kb/2545698 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2545698: Text in some core fonts appears blurred in Internet Explorer 9 on a computer that is running Windows Vista, Windows Server 2008, Windows 7, or Windows Server 2008 R2 - Windows 2008 R2 Gold / Windows 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 254569803 Fixlet Link: http://support.microsoft.com/kb/2545698 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2545698: Text in some core fonts appears blurred in Internet Explorer 9 on a computer that is running Windows Vista, Windows Server 2008, Windows 7, or Windows Server 2008 R2 - Windows Server 2008 SP2 (Japanese) Severity: N/A Fixlet ID: 254569805 Fixlet Link: http://support.microsoft.com/kb/2545698 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2545698: Text in some core fonts appears blurred in Internet Explorer 9 on a computer that is running Windows Vista, Windows Server 2008, Windows 7, or Windows Server 2008 R2 - Windows Vista SP2 (Japanese) Severity: N/A Fixlet ID: 254569809 Fixlet Link: http://support.microsoft.com/kb/2545698 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2545698: Text in some core fonts appears blurred in Internet Explorer 9 on a computer that is running Windows Vista, Windows Server 2008, Windows 7, or Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 254569811 Fixlet Link: http://support.microsoft.com/kb/2545698 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2545698: Text in some core fonts appears blurred in Internet Explorer 9 on a computer that is running Windows Vista, Windows Server 2008, Windows 7, or Windows Server 2008 R2 - Windows 2008 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 254569815 Fixlet Link: http://support.microsoft.com/kb/2545698 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2545698: Text in some core fonts appears blurred in Internet Explorer 9 on a computer that is running Windows Vista, Windows Server 2008, Windows 7, or Windows Server 2008 R2 - Windows Vista SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 254569817 Fixlet Link: http://support.microsoft.com/kb/2545698 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2547666: You cannot delete long URLs from the browsing history in Internet Explorer on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 254766601 Fixlet Link: http://support.microsoft.com/kb/2547666 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2547666: You cannot delete long URLs from the browsing history in Internet Explorer on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 2008 R2 Gold / Windows 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 254766603 Fixlet Link: http://support.microsoft.com/kb/2547666 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2547666: You cannot delete long URLs from the browsing history in Internet Explorer on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 254766605 Fixlet Link: http://support.microsoft.com/kb/2547666 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2563227: An SVG graphic that has attributes that use large values may not be parsed correctly - Windows Vista SP2 (Japanese) Severity: N/A Fixlet ID: 256322701 Fixlet Link: http://support.microsoft.com/kb/2563227 Fixlet Description: Install this update to resolve performance and reliability issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2563227: An SVG graphic that has attributes that use large values may not be parsed correctly - Windows Server 2008 R2 Gold / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 256322705 Fixlet Link: http://support.microsoft.com/kb/2563227 Fixlet Description: Install this update to resolve performance and reliability issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2563227: An SVG graphic that has attributes that use large values may not be parsed correctly - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 256322709 Fixlet Link: http://support.microsoft.com/kb/2563227 Fixlet Description: Install this update to resolve performance and reliability issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2563227: An SVG graphic that has attributes that use large values may not be parsed correctly - Windows Server 2008 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 256322711 Fixlet Link: http://support.microsoft.com/kb/2563227 Fixlet Description: Install this update to resolve performance and reliability issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2563227: An SVG graphic that has attributes that use large values may not be parsed correctly - Windows Vista SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 256322713 Fixlet Link: http://support.microsoft.com/kb/2563227 Fixlet Description: Install this update to resolve performance and reliability issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2563227: An SVG graphic that has attributes that use large values may not be parsed correctly - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 256322715 Fixlet Link: http://support.microsoft.com/kb/2563227 Fixlet Description: Install this update to resolve performance and reliability issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2563227: An SVG graphic that has attributes that use large values may not be parsed correctly - Windows Server 2008 SP2 (Japanese) Severity: N/A Fixlet ID: 256322717 Fixlet Link: http://support.microsoft.com/kb/2563227 Fixlet Description: Install this update to resolve performance and reliability issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2640148: Windows Explorer stops responding if you try to expand a mapped drive in Windows 7 or in Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 264014801 Fixlet Link: http://support.microsoft.com/kb/2640148 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2640148: Windows Explorer stops responding if you try to expand a mapped drive in Windows 7 or in Windows Server 2008 R2 - Windows Server 2008 R2 Gold / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 264014803 Fixlet Link: http://support.microsoft.com/kb/2640148 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2640148: Windows Explorer stops responding if you try to expand a mapped drive in Windows 7 or in Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 264014805 Fixlet Link: http://support.microsoft.com/kb/2640148 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2647753: Update rollup: Fix printing problems in Windows 7 and Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 264775303 Fixlet Link: http://support.microsoft.com/kb/2647753 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2647753: Update rollup: Fix printing problems in Windows 7 and Windows Server 2008 R2 - Windows Server 2008 R2 Gold / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 264775305 Fixlet Link: http://support.microsoft.com/kb/2647753 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2647753: Update rollup: Fix printing problems in Windows 7 and Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 264775307 Fixlet Link: http://support.microsoft.com/kb/2647753 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2660075: You cannot change the time and date if the time zone is set to Samoa (UTC+13:00) and KB 2657025 is installed in Windows 7 or in Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 266007501 Fixlet Link: http://support.microsoft.com/kb/2660075 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2660075: You cannot change the time and date if the time zone is set to Samoa (UTC+13:00) and KB 2657025 is installed in Windows 7 or in Windows Server 2008 R2 - Windows 2008 R2 Gold / Windows 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 266007503 Fixlet Link: http://support.microsoft.com/kb/2660075 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2660075: You cannot change the time and date if the time zone is set to Samoa (UTC+13:00) and KB 2657025 is installed in Windows 7 or in Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 266007507 Fixlet Link: http://support.microsoft.com/kb/2660075 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2709630: Delay occurs when you log on to a domain from a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 270963003 Fixlet Link: http://support.microsoft.com/kb/2709630 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2709630: Delay occurs when you log on to a domain from a computer that is running Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 Gold / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 270963005 Fixlet Link: http://support.microsoft.com/kb/2709630 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2709630: Delay occurs when you log on to a domain from a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 270963007 Fixlet Link: http://support.microsoft.com/kb/2709630 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2732500: "E_UNEXPECTED 0x8000ffff" error when you try to restore a system by using System Recovery Options in Windows 7 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 273250001 Fixlet Link: http://support.microsoft.com/kb/2732500 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2732500: "E_UNEXPECTED 0x8000ffff" error when you try to restore a system by using System Recovery Options in Windows 7 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 273250003 Fixlet Link: http://support.microsoft.com/kb/2732500 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2761217: An update is available to add the Calibri Light and Calibri Light Italic fonts to Windows 7 and Windows Server 2008 R2 - Windows Server 2008 R2 Gold / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 276121701 Fixlet Link: http://support.microsoft.com/kb/2761217 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2761217: An update is available to add the Calibri Light and Calibri Light Italic fonts to Windows 7 and Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 276121703 Fixlet Link: http://support.microsoft.com/kb/2761217 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2761217: An update is available to add the Calibri Light and Calibri Light Italic fonts to Windows 7 and Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 276121705 Fixlet Link: http://support.microsoft.com/kb/2761217 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2799926: USB storage device cannot be recognized or mounted on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 Gold / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 279992601 Fixlet Link: http://support.microsoft.com/kb/2799926 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2799926: USB storage device cannot be recognized or mounted on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 279992603 Fixlet Link: http://support.microsoft.com/kb/2799926 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2799926: USB storage device cannot be recognized or mounted on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 Gold / Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 279992607 Fixlet Link: http://support.microsoft.com/kb/2799926 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2877213: Applications disappear from the Start screen after you refresh a Windows RT, Windows 8, or Windows Server 2012-based computer by using a push-button reset recovery image - Windows 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 287721301 Fixlet Link: http://support.microsoft.com/kb/2877213 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2877213: Applications disappear from the Start screen after you refresh a Windows RT, Windows 8, or Windows Server 2012-based computer by using a push-button reset recovery image - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 287721303 Fixlet Link: http://support.microsoft.com/kb/2877213 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2877213: Applications disappear from the Start screen after you refresh a Windows RT, Windows 8, or Windows Server 2012-based computer by using a push-button reset recovery image - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 287721305 Fixlet Link: http://support.microsoft.com/kb/2877213 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2882780: Incorrect UI color rendering when an application uses the D3D11CreateDevice or D3D10CreateDevice function in Windows - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 288278005 Fixlet Link: http://support.microsoft.com/kb/2882780 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2883054: Update for SharePoint Server 2013 - KB2883054 - SharePoint Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288305401 Fixlet Link: http://support.microsoft.com/kb/2883054 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Enterprise Server 2013 . This update provides the latest fixes to Microsoft SharePoint Enterprise Server 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2896496: Update adds BPA rules for DirectAccess in Windows Server 2012 R2 or Windows Server 2012 - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 289649601 Fixlet Link: http://support.microsoft.com/kb/2896496 Fixlet Description: You can use the DA Rules update for Best Practices Analyzer to scan a server that is running the DA role. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2896496: Update adds BPA rules for DirectAccess in Windows Server 2012 R2 or Windows Server 2012 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 289649603 Fixlet Link: http://support.microsoft.com/kb/2896496 Fixlet Description: You can use the DA Rules update for Best Practices Analyzer to scan a server that is running the DA role. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2899189: Update adds support for many camera-specific file formats in Windows 8.1 or Windows RT 8.1: December 2013 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 289918901 Fixlet Link: http://support.microsoft.com/kb/2899189 Fixlet Description: Installing the Microsoft Camera Codec Pack enables the viewing of a variety of device-specific file formats and will allow supported RAW camera files to be viewable in applications in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2899189: Update adds support for many camera-specific file formats in Windows 8.1 or Windows RT 8.1: December 2013 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 289918905 Fixlet Link: http://support.microsoft.com/kb/2899189 Fixlet Description: Installing the Microsoft Camera Codec Pack enables the viewing of a variety of device-specific file formats and will allow supported RAW camera files to be viewable in applications in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2927811: Password cannot be changed in a Windows Server 2003 SP2 domain - Windows Server 2003 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 292781101 Fixlet Link: http://support.microsoft.com/kb/2927811 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2927811: Password cannot be changed in a Windows Server 2003 SP2 domain - Windows Server 2003 SP2 (Japanese) Severity: N/A Fixlet ID: 292781103 Fixlet Link: http://support.microsoft.com/kb/2927811 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2928562: Event 55 when you copy an encrypted folder to EFS shared folder in Windows - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 292856201 Fixlet Link: http://support.microsoft.com/kb/2928562 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2928562: Event 55 when you copy an encrypted folder to EFS shared folder in Windows - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 292856203 Fixlet Link: http://support.microsoft.com/kb/2928562 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2928562: Event 55 when you copy an encrypted folder to EFS shared folder in Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 292856205 Fixlet Link: http://support.microsoft.com/kb/2928562 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2932074: Windows 8 Application Launcher node on ELM tool cannot start on the Windows Embedded 8.1 Industry device - Windows Embedded 8.1 Industry (x64) (Japanese) Severity: N/A Fixlet ID: 293207401 Fixlet Link: http://support.microsoft.com/kb/2932074 Fixlet Description: This KB adds support to enable the Embedded Lockdown Manager Update to configure the Windows 8 Application Launcher. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2932074: Windows 8 Application Launcher node on ELM tool cannot start on the Windows Embedded 8.1 Industry device - Windows Embedded 8.1 Industry (Japanese) Severity: N/A Fixlet ID: 293207403 Fixlet Link: http://support.microsoft.com/kb/2932074 Fixlet Description: This KB adds support to enable the Embedded Lockdown Manager Update to configure the Windows 8 Application Launcher. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2938066: An update to harden Windows Server Update Services - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 293806601 Fixlet Link: http://support.microsoft.com/kb/2938066 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2938066: An update to harden Windows Server Update Services - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 293806607 Fixlet Link: http://support.microsoft.com/kb/2938066 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2938459: Windows Communications Apps update for Windows 8 and Windows RT - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 293845901 Fixlet Link: http://support.microsoft.com/kb/2938459 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2938459: Windows Communications Apps update for Windows 8 and Windows RT - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 293845903 Fixlet Link: http://support.microsoft.com/kb/2938459 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2957026: Update for Windows 8.1 Upgrade notification in Windows 8 and Windows RT - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 295702601 Fixlet Link: http://support.microsoft.com/kb/2957026 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2957026: Update for Windows 8.1 Upgrade notification in Windows 8 and Windows RT - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 295702603 Fixlet Link: http://support.microsoft.com/kb/2957026 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2959936: You cannot set the breakout key by using a hexadecimal value in Windows Embedded 8.1 Industry - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 295993601 Fixlet Link: http://support.microsoft.com/kb/2959936 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2959936: You cannot set the breakout key by using a hexadecimal value in Windows Embedded 8.1 Industry - Windows 7 SP1 / Windows 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 295993603 Fixlet Link: http://support.microsoft.com/kb/2959936 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2959936: You cannot set the breakout key by using a hexadecimal value in Windows Embedded 8.1 Industry - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 295993605 Fixlet Link: http://support.microsoft.com/kb/2959936 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2959936: You cannot set the breakout key by using a hexadecimal value in Windows Embedded 8.1 Industry - Windows 8 Gold / Windows 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 295993607 Fixlet Link: http://support.microsoft.com/kb/2959936 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2959936: You cannot set the breakout key by using a hexadecimal value in Windows Embedded 8.1 Industry - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 295993609 Fixlet Link: http://support.microsoft.com/kb/2959936 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2959936: You cannot set the breakout key by using a hexadecimal value in Windows Embedded 8.1 Industry - Windows 8.1 Gold / Windows 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 295993611 Fixlet Link: http://support.microsoft.com/kb/2959936 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2962156: Camera app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296215601 Fixlet Link: http://support.microsoft.com/kb/2962156 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962156: Camera app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296215603 Fixlet Link: http://support.microsoft.com/kb/2962156 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962163: Xbox Video app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296216301 Fixlet Link: http://support.microsoft.com/kb/2962163 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962163: Xbox Video app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296216303 Fixlet Link: http://support.microsoft.com/kb/2962163 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962168: Photos app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296216801 Fixlet Link: http://support.microsoft.com/kb/2962168 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962168: Photos app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296216803 Fixlet Link: http://support.microsoft.com/kb/2962168 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962169: Xbox Games app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296216901 Fixlet Link: http://support.microsoft.com/kb/2962169 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962169: Xbox Games app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296216903 Fixlet Link: http://support.microsoft.com/kb/2962169 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962171: Xbox Music app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296217101 Fixlet Link: http://support.microsoft.com/kb/2962171 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962171: Xbox Music app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296217103 Fixlet Link: http://support.microsoft.com/kb/2962171 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962173: Bing Finance app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296217301 Fixlet Link: http://support.microsoft.com/kb/2962173 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962173: Bing Finance app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296217303 Fixlet Link: http://support.microsoft.com/kb/2962173 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962175: Bing News app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296217501 Fixlet Link: http://support.microsoft.com/kb/2962175 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962175: Bing News app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296217503 Fixlet Link: http://support.microsoft.com/kb/2962175 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962176: Bing Sports app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296217601 Fixlet Link: http://support.microsoft.com/kb/2962176 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962176: Bing Sports app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296217603 Fixlet Link: http://support.microsoft.com/kb/2962176 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962177: Bing Travel app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296217701 Fixlet Link: http://support.microsoft.com/kb/2962177 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962177: Bing Travel app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296217703 Fixlet Link: http://support.microsoft.com/kb/2962177 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962178: Bing Weather app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296217801 Fixlet Link: http://support.microsoft.com/kb/2962178 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962178: Bing Weather app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296217803 Fixlet Link: http://support.microsoft.com/kb/2962178 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962179: Bing Search app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296217901 Fixlet Link: http://support.microsoft.com/kb/2962179 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962179: Bing Search app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296217903 Fixlet Link: http://support.microsoft.com/kb/2962179 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962180: Bing Maps app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296218001 Fixlet Link: http://support.microsoft.com/kb/2962180 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962180: Bing Maps app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296218003 Fixlet Link: http://support.microsoft.com/kb/2962180 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962181: Reader app update for WSUS for Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 296218101 Fixlet Link: http://support.microsoft.com/kb/2962181 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962181: Reader app update for WSUS for Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296218103 Fixlet Link: http://support.microsoft.com/kb/2962181 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962182: Windows Communications Apps update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296218201 Fixlet Link: http://support.microsoft.com/kb/2962182 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962182: Windows Communications Apps update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296218203 Fixlet Link: http://support.microsoft.com/kb/2962182 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962183: Xbox Games app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296218301 Fixlet Link: http://support.microsoft.com/kb/2962183 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962183: Xbox Games app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296218303 Fixlet Link: http://support.microsoft.com/kb/2962183 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962184: Xbox Music app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296218401 Fixlet Link: http://support.microsoft.com/kb/2962184 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962184: Xbox Music app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296218403 Fixlet Link: http://support.microsoft.com/kb/2962184 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962185: Xbox Video app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296218501 Fixlet Link: http://support.microsoft.com/kb/2962185 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962185: Xbox Video app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296218503 Fixlet Link: http://support.microsoft.com/kb/2962185 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962186: Bing Finance app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296218601 Fixlet Link: http://support.microsoft.com/kb/2962186 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962186: Bing Finance app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296218603 Fixlet Link: http://support.microsoft.com/kb/2962186 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962187: Bing Health & Fitness app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296218701 Fixlet Link: http://support.microsoft.com/kb/2962187 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962187: Bing Health & Fitness app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296218703 Fixlet Link: http://support.microsoft.com/kb/2962187 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962188: Bing News app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296218801 Fixlet Link: http://support.microsoft.com/kb/2962188 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962188: Bing News app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296218803 Fixlet Link: http://support.microsoft.com/kb/2962188 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962189: Bing Sports app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296218901 Fixlet Link: http://support.microsoft.com/kb/2962189 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962189: Bing Sports app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296218903 Fixlet Link: http://support.microsoft.com/kb/2962189 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962190: Bing Travel app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296219001 Fixlet Link: http://support.microsoft.com/kb/2962190 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962190: Bing Travel app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296219003 Fixlet Link: http://support.microsoft.com/kb/2962190 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962191: Bing Weather app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296219101 Fixlet Link: http://support.microsoft.com/kb/2962191 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962191: Bing Weather app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296219103 Fixlet Link: http://support.microsoft.com/kb/2962191 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962192: Bing Maps app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296219201 Fixlet Link: http://support.microsoft.com/kb/2962192 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962192: Bing Maps app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296219203 Fixlet Link: http://support.microsoft.com/kb/2962192 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962193: Reader app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296219301 Fixlet Link: http://support.microsoft.com/kb/2962193 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962193: Reader app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296219303 Fixlet Link: http://support.microsoft.com/kb/2962193 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962194: Help and Tips app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296219401 Fixlet Link: http://support.microsoft.com/kb/2962194 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962194: Help and Tips app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296219403 Fixlet Link: http://support.microsoft.com/kb/2962194 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962195: Windows Reading List app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296219501 Fixlet Link: http://support.microsoft.com/kb/2962195 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962195: Windows Reading List app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296219503 Fixlet Link: http://support.microsoft.com/kb/2962195 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962196: Calculator app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296219601 Fixlet Link: http://support.microsoft.com/kb/2962196 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962196: Calculator app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296219603 Fixlet Link: http://support.microsoft.com/kb/2962196 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962197: Alarms app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296219701 Fixlet Link: http://support.microsoft.com/kb/2962197 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962197: Alarms app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296219703 Fixlet Link: http://support.microsoft.com/kb/2962197 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962198: Sound Recorder app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296219801 Fixlet Link: http://support.microsoft.com/kb/2962198 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962198: Sound Recorder app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296219803 Fixlet Link: http://support.microsoft.com/kb/2962198 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962199: Bing Food & Drink app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296219901 Fixlet Link: http://support.microsoft.com/kb/2962199 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962199: Bing Food & Drink app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296219903 Fixlet Link: http://support.microsoft.com/kb/2962199 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962200: Scan app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296220001 Fixlet Link: http://support.microsoft.com/kb/2962200 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962200: Scan app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296220003 Fixlet Link: http://support.microsoft.com/kb/2962200 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962201: Skype app update for WSUS for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 296220101 Fixlet Link: http://support.microsoft.com/kb/2962201 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2962201: Skype app update for WSUS for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 296220103 Fixlet Link: http://support.microsoft.com/kb/2962201 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2975331: August 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297533101 Fixlet Link: http://support.microsoft.com/kb/2975331 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2975331: August 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows Server 2012 Gold (x64) - KB2993651 (Japanese) Severity: N/A Fixlet ID: 297533103 Fixlet Link: http://support.microsoft.com/kb/2975331 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2975331: August 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297533105 Fixlet Link: http://support.microsoft.com/kb/2975331 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2975331: August 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows 8 Gold (x64) - KB2993651 (Japanese) Severity: N/A Fixlet ID: 297533107 Fixlet Link: http://support.microsoft.com/kb/2975331 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2975331: August 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 297533109 Fixlet Link: http://support.microsoft.com/kb/2975331 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2975331: August 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows 8 Gold - KB2993651 (Japanese) Severity: N/A Fixlet ID: 297533111 Fixlet Link: http://support.microsoft.com/kb/2975331 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2977728: Computer is on low memory when you move a video file in Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297772801 Fixlet Link: http://support.microsoft.com/kb/2977728 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2977728: Computer is on low memory when you move a video file in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297772803 Fixlet Link: http://support.microsoft.com/kb/2977728 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2977728: Computer is on low memory when you move a video file in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 297772805 Fixlet Link: http://support.microsoft.com/kb/2977728 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2977759: Compatibility update for Windows 7 RTM - Windows 7 Gold/SP1 (Japanese) Severity: N/A Fixlet ID: 297775901 Fixlet Link: http://support.microsoft.com/kb/2977759 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2977759: Compatibility update for Windows 7 RTM - Windows 7 Gold/SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297775903 Fixlet Link: http://support.microsoft.com/kb/2977759 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2978092: Graphics software or applications crash when they use WARP for software rendering in Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297809201 Fixlet Link: http://support.microsoft.com/kb/2978092 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2978092: Graphics software or applications crash when they use WARP for software rendering in Windows - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 297809203 Fixlet Link: http://support.microsoft.com/kb/2978092 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2978092: Graphics software or applications crash when they use WARP for software rendering in Windows - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297809205 Fixlet Link: http://support.microsoft.com/kb/2978092 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2979500: August 2014 update to support many camera-specific file formats in Windows 8.1 and Windows RT 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297950001 Fixlet Link: http://support.microsoft.com/kb/2979500 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2979500: August 2014 update to support many camera-specific file formats in Windows 8.1 and Windows RT 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 297950003 Fixlet Link: http://support.microsoft.com/kb/2979500 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2979501: September 2014 update to support many camera-specific file formats in Windows 8 and Windows RT - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297950101 Fixlet Link: http://support.microsoft.com/kb/2979501 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2979501: September 2014 update to support many camera-specific file formats in Windows 8 and Windows RT - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 297950103 Fixlet Link: http://support.microsoft.com/kb/2979501 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2980245: Windows Explorer crashes when you cut the same file three times in Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298024501 Fixlet Link: http://support.microsoft.com/kb/2980245 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2980245: Windows Explorer crashes when you cut the same file three times in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 298024503 Fixlet Link: http://support.microsoft.com/kb/2980245 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2980245: Windows Explorer crashes when you cut the same file three times in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298024505 Fixlet Link: http://support.microsoft.com/kb/2980245 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2984005: September 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows 8 Gold - KB2977174 (Japanese) Severity: N/A Fixlet ID: 298400501 Fixlet Link: http://support.microsoft.com/kb/2984005 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2984005: September 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows 8 Gold - KB2984005 (Japanese) Severity: N/A Fixlet ID: 298400503 Fixlet Link: http://support.microsoft.com/kb/2984005 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2984005: September 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows 8 Gold (x64) - KB2977174 (Japanese) Severity: N/A Fixlet ID: 298400505 Fixlet Link: http://support.microsoft.com/kb/2984005 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2984005: September 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows 8 Gold (x64) - KB2984005 (Japanese) Severity: N/A Fixlet ID: 298400507 Fixlet Link: http://support.microsoft.com/kb/2984005 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2984005: September 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows Server 2012 Gold (x64) - KB2977174 (Japanese) Severity: N/A Fixlet ID: 298400509 Fixlet Link: http://support.microsoft.com/kb/2984005 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2984005: September 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows Server 2012 Gold (x64) - KB2984005 (Japanese) Severity: N/A Fixlet ID: 298400511 Fixlet Link: http://support.microsoft.com/kb/2984005 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2985461: Error 0x800401f0 when you update RemoteApp and Desktop Connections feeds in Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298546101 Fixlet Link: http://support.microsoft.com/kb/2985461 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2985461: Error 0x800401f0 when you update RemoteApp and Desktop Connections feeds in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 298546103 Fixlet Link: http://support.microsoft.com/kb/2985461 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2985461: Error 0x800401f0 when you update RemoteApp and Desktop Connections feeds in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298546105 Fixlet Link: http://support.microsoft.com/kb/2985461 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2989956: Several issues after you install security update 2843638 or 2843639 on an AD FS server - Windows Server 2008 SP2 (Japanese) Severity: N/A Fixlet ID: 298995601 Fixlet Link: http://support.microsoft.com/kb/2989956 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2989956: Several issues after you install security update 2843638 or 2843639 on an AD FS server - Windows Server 2008 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 298995603 Fixlet Link: http://support.microsoft.com/kb/2989956 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2989956: Several issues after you install security update 2843638 or 2843639 on an AD FS server - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298995605 Fixlet Link: http://support.microsoft.com/kb/2989956 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2989956: Several issues after you install security update 2843638 or 2843639 on an AD FS server - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298995607 Fixlet Link: http://support.microsoft.com/kb/2989956 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299852701 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 299852703 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows Server 2008 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 299852705 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299852707 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299852709 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299852711 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 299852713 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 299852715 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows Server 2008 SP2 (Japanese) Severity: N/A Fixlet ID: 299852721 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 299852723 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 299852725 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows Vista SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 299852727 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows Vista SP2 (Japanese) Severity: N/A Fixlet ID: 299852729 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows Server 2003 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 299852731 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2998527: A September, 2014 time zone update for Russia is available - Windows Server 2003 SP2 (Japanese) Severity: N/A Fixlet ID: 299852733 Fixlet Link: http://support.microsoft.com/kb/2998527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. From autonotify at us.ibm.com Fri Oct 3 02:34:17 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Fri, 3 Oct 2014 02:34:17 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201410030934.s939YI2R018114@d03av05.boulder.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 606 Published: Fri, 03 Oct 2014 09:06:40 GMT New Fixlets: ============ *************************************************************** Title: 2990967: Some versions of the OneDrive desktop app for Windows do not update automatically - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299096701 Fixlet Link: http://support.microsoft.com/kb/2990967 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2990967: Some versions of the OneDrive desktop app for Windows do not update automatically - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 299096703 Fixlet Link: http://support.microsoft.com/kb/2990967 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3001554: Update for DVD playback - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 300155401 Fixlet Link: http://support.microsoft.com/kb/3001554 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3001554: Update for DVD playback - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 300155403 Fixlet Link: http://support.microsoft.com/kb/3001554 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. From autonotify at us.ibm.com Wed Oct 15 02:34:03 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Wed, 15 Oct 2014 02:34:03 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201410150934.s9F9Y3EQ015559@d01av02.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 608 Published: Tue, 14 Oct 2014 21:27:56 GMT New Fixlets: ============ *************************************************************** Title: 2889865: Update for SharePoint Server 2013 - KB2889865 - SharePoint Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288986501 Fixlet Link: http://support.microsoft.com/kb/2889865 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Enterprise Server 2013 . This update provides the latest fixes to Microsoft SharePoint Enterprise Server 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. From autonotify at us.ibm.com Fri Oct 17 02:34:33 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Fri, 17 Oct 2014 02:34:33 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201410170934.s9H9YY40031544@d03av05.boulder.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 609 Published: Thu, 16 Oct 2014 09:33:40 GMT New Fixlets: ============ *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB2987107 (Japanese) Severity: Critical Fixlet ID: 1405601 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB2987107 (x64) (Japanese) Severity: Critical Fixlet ID: 1405603 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB2987107 (Japanese) Severity: Moderate Fixlet ID: 1405605 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB2987107 (Japanese) Severity: Critical Fixlet ID: 1405607 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405609 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB2987107 (x64) (Japanese) Severity: Critical Fixlet ID: 1405611 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB2987107 (x64) (Japanese) Severity: Critical Fixlet ID: 1405613 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB2987107 (Japanese) Severity: Critical Fixlet ID: 1405615 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB2987107 (x64) (Japanese) Severity: Critical Fixlet ID: 1405617 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405619 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405621 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB2987107 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1405622 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB2987107 (Japanese) Severity: Critical Fixlet ID: 1405623 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405625 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB2987107 (x64) (Japanese) Severity: Critical Fixlet ID: 1405627 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB2987107 (Japanese) Severity: Critical Fixlet ID: 1405629 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405631 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405633 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB2987107 (Japanese) Severity: Critical Fixlet ID: 1405635 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB2987107 (Japanese) Severity: Moderate Fixlet ID: 1405637 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB2987107 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1405638 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB2987107 (Japanese) Severity: Moderate Fixlet ID: 1405639 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB2987107 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1405640 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB2987107 (x64) (Japanese) Severity: Critical Fixlet ID: 1405641 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB2987107 (Japanese) Severity: Moderate Fixlet ID: 1405643 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB2987107 (Japanese) Severity: Critical Fixlet ID: 1405645 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405647 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB2987107 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1405648 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB2987107 (Japanese) Severity: Critical Fixlet ID: 1405649 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405651 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB2987107 (Japanese) Severity: Moderate Fixlet ID: 1405653 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB2987107 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1405654 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB2987107 (Japanese) Severity: Moderate Fixlet ID: 1405655 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB2987107 (Japanese) Severity: Critical Fixlet ID: 1405657 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB2987107 (x64) (Japanese) Severity: Critical Fixlet ID: 1405659 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB2987107 (x64) (Japanese) Severity: Critical Fixlet ID: 1405661 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405663 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405665 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405667 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB2987107 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1405668 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 *************************************************************** Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB2987107 (x64) (Japanese) Severity: Moderate Fixlet ID: 1405669 Fixlet Link: http://technet.microsoft.com/library/security/MS14-056 Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2972103 (x64) (Japanese) Severity: Critical Fixlet ID: 1405701 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2972098 (x64) (Japanese) Severity: Critical Fixlet ID: 1405703 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2979573 (x64) (Japanese) Severity: Important Fixlet ID: 1405705 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2979570 (x64) (Japanese) Severity: Important Fixlet ID: 1405707 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2979574 (Japanese) Severity: Important Fixlet ID: 1405709 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2972106 (Japanese) Severity: Critical Fixlet ID: 1405711 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2968296 (x64) (Japanese) Severity: Important Fixlet ID: 1405713 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978042 (x64) (Japanese) Severity: Critical Fixlet ID: 1405715 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2972105 (Japanese) Severity: Critical Fixlet ID: 1405717 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2979578 (x64) (Japanese) Severity: Important Fixlet ID: 1405719 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2979576 (Japanese) Severity: Important Fixlet ID: 1405721 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB2968296 (Japanese) Severity: Important Fixlet ID: 1405723 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB2979570 (Japanese) Severity: Important Fixlet ID: 1405725 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2978041 (Japanese) Severity: Critical Fixlet ID: 1405727 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2979568 (Japanese) Severity: Important Fixlet ID: 1405729 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2979577 (x64) (Japanese) Severity: Important Fixlet ID: 1405731 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978042 (Japanese) Severity: Critical Fixlet ID: 1405733 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB2968294 (Japanese) Severity: Important Fixlet ID: 1405735 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2968292 (x64) (Japanese) Severity: Important Fixlet ID: 1405737 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2968294 (x64) (Japanese) Severity: Important Fixlet ID: 1405739 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2978041 (x64) (Japanese) Severity: Critical Fixlet ID: 1405741 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB2979573 (Japanese) Severity: Important Fixlet ID: 1405743 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2979568 (x64) (Japanese) Severity: Important Fixlet ID: 1405745 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB2972101 (Japanese) Severity: Critical Fixlet ID: 1405747 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2972098 (Japanese) Severity: Critical Fixlet ID: 1405749 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2979 (Japanese) Severity: Important Fixlet ID: 1405751 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2972101 (x64) (Japanese) Severity: Critical Fixlet ID: 1405753 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2972107 (Japanese) Severity: Critical Fixlet ID: 1405755 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB2972103 (Japanese) Severity: Critical Fixlet ID: 1405757 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2968292 (Japanese) Severity: Important Fixlet ID: 1405759 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2979578 (Japanese) Severity: Important Fixlet ID: 1405761 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2979574 (x64) (Japanese) Severity: Important Fixlet ID: 1405763 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2979571 (x64) (Japanese) Severity: Important Fixlet ID: 1405765 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2972 (Japanese) Severity: Critical Fixlet ID: 1405767 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2972100 (x64) (Japanese) Severity: Critical Fixlet ID: 1405769 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2979577 (Japanese) Severity: Important Fixlet ID: 1405771 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2979575 (Japanese) Severity: Important Fixlet ID: 1405773 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB2972100 (Japanese) Severity: Critical Fixlet ID: 1405775 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2972107 (x64) (Japanese) Severity: Critical Fixlet ID: 1405777 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2979576 (x64) (Japanese) Severity: Important Fixlet ID: 1405779 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB2979571 (Japanese) Severity: Important Fixlet ID: 1405781 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2968295 (x64) (Japanese) Severity: Important Fixlet ID: 1405783 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB2968295 (Japanese) Severity: Important Fixlet ID: 1405785 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2972105 (x64) (Japanese) Severity: Critical Fixlet ID: 1405787 Fixlet Link: http://technet.microsoft.com/library/security/MS14-057 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3000061 (x64) (Japanese) Severity: Critical Fixlet ID: 1405801 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Vista SP2 - KB3000061 (x64) (Japanese) Severity: Critical Fixlet ID: 1405803 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000061 (Japanese) Severity: Critical Fixlet ID: 1405805 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8 Gold - KB3000061 (x64) (Japanese) Severity: Critical Fixlet ID: 1405807 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000061 (x64) (Japanese) Severity: Critical Fixlet ID: 1405809 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Vista SP2 - KB3000061 (Japanese) Severity: Critical Fixlet ID: 1405811 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 7 SP1 - KB3000061 (x64) (Japanese) Severity: Critical Fixlet ID: 1405813 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8 Gold - KB3000061 (Japanese) Severity: Critical Fixlet ID: 1405815 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3000061 (x64) (Japanese) Severity: Critical Fixlet ID: 1405817 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3000061 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1405818 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 7 SP1 - KB3000061 (Japanese) Severity: Critical Fixlet ID: 1405819 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3000061 (x64) (Japanese) Severity: Critical Fixlet ID: 1405821 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000061 (x64) (Japanese) Severity: Critical Fixlet ID: 1405823 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000061 (Japanese) Severity: Critical Fixlet ID: 1405825 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3000061 (Japanese) Severity: Critical Fixlet ID: 1405827 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3000061 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1405828 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 *************************************************************** Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3000061 (x64) (Japanese) Severity: Critical Fixlet ID: 1405829 Fixlet Link: http://technet.microsoft.com/library/security/MS14-058 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 2.0 - KB2993939 (Japanese) Severity: Important Fixlet ID: 1405901 Fixlet Link: http://technet.microsoft.com/library/security/MS14-059 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 3.0 - KB2993937 (Japanese) Severity: Important Fixlet ID: 1405903 Fixlet Link: http://technet.microsoft.com/library/security/MS14-059 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 4.0 - KB2993928 (Japanese) Severity: Important Fixlet ID: 1405905 Fixlet Link: http://technet.microsoft.com/library/security/MS14-059 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 5.0 - KB2992080 (Japanese) Severity: Important Fixlet ID: 1405907 Fixlet Link: http://technet.microsoft.com/library/security/MS14-059 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 5.1 - KB2994397 (Japanese) Severity: Important Fixlet ID: 1405909 Fixlet Link: http://technet.microsoft.com/library/security/MS14-059 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3000869 (x64) (Japanese) Severity: Important Fixlet ID: 1406001 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3000869 (x64) (Japanese) Severity: Important Fixlet ID: 1406003 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000869 (Japanese) Severity: Important Fixlet ID: 1406005 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3000869 (Japanese) Severity: Important Fixlet ID: 1406007 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000869 (x64) (Japanese) Severity: Important Fixlet ID: 1406009 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3000869 (Japanese) Severity: Important Fixlet ID: 1406011 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3000869 (x64) (Japanese) Severity: Important Fixlet ID: 1406013 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3000869 (x64) (Japanese) Severity: Important Fixlet ID: 1406015 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3000869 (Japanese) Severity: Important Fixlet ID: 1406017 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000869 (Japanese) Severity: Important Fixlet ID: 1406019 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000869 (x64) (Japanese) Severity: Important Fixlet ID: 1406021 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3000869 (x64) (Japanese) Severity: Important Fixlet ID: 1406023 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3000869 (x64) (Japanese) Severity: Important Fixlet ID: 1406025 Fixlet Link: http://technet.microsoft.com/library/security/MS14-060 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office 2010 SP1/SP2 - KB2883008 (Japanese) Severity: Important Fixlet ID: 1406103 Fixlet Link: http://technet.microsoft.com/library/security/MS14-061 Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Word 2010 SP1/SP2 - KB2883013 (Japanese) Severity: Important Fixlet ID: 1406105 Fixlet Link: http://technet.microsoft.com/library/security/MS14-061 Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office 2010 SP1/SP2 - KB2883008 (x64) (Japanese) Severity: Important Fixlet ID: 1406107 Fixlet Link: http://technet.microsoft.com/library/security/MS14-061 Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Word 2007 SP3 - KB2883032 (Japanese) Severity: Important Fixlet ID: 1406109 Fixlet Link: http://technet.microsoft.com/library/security/MS14-061 Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office 2007 SP3 / Office Compatibility Pack SP 3 - KB2883031 (Japanese) Severity: Important Fixlet ID: 1406111 Fixlet Link: http://technet.microsoft.com/library/security/MS14-061 Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office Web Apps Server 2010 Gold/SP1/SP2 - KB2889827 (x64) (Japanese) Severity: Important Fixlet ID: 1406113 Fixlet Link: http://technet.microsoft.com/library/security/MS14-061 Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - SharePoint Server 2010 SP1/SP2 - Word Automation Services - KB2883098 (x64) (Japanese) Severity: Important Fixlet ID: 1406115 Fixlet Link: http://technet.microsoft.com/library/security/MS14-061 Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Word 2010 SP1/SP2 - KB2883013 (x64) (Japanese) Severity: Important Fixlet ID: 1406117 Fixlet Link: http://technet.microsoft.com/library/security/MS14-061 Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2993254 (Japanese) Severity: Important Fixlet ID: 1406201 Fixlet Link: http://technet.microsoft.com/library/security/MS14-062 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access to the affected system. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually enable the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2993254 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1406202 Fixlet Link: http://technet.microsoft.com/library/security/MS14-062 *************************************************************** Title: MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2993254 (x64) (Japanese) Severity: Important Fixlet ID: 1406203 Fixlet Link: http://technet.microsoft.com/library/security/MS14-062 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access to the affected system. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually enable the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2993254 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1406204 Fixlet Link: http://technet.microsoft.com/library/security/MS14-062 *************************************************************** Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB2998579 (x64) (Japanese) Severity: Important Fixlet ID: 1406301 Fixlet Link: http://technet.microsoft.com/library/security/MS14-063 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB2998579 (Japanese) Severity: Important Fixlet ID: 1406303 Fixlet Link: http://technet.microsoft.com/library/security/MS14-063 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB2998579 (Japanese) Severity: Important Fixlet ID: 1406305 Fixlet Link: http://technet.microsoft.com/library/security/MS14-063 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB2998579 (x64) (Japanese) Severity: Important Fixlet ID: 1406307 Fixlet Link: http://technet.microsoft.com/library/security/MS14-063 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2998579 (x64) (Japanese) Severity: Important Fixlet ID: 1406309 Fixlet Link: http://technet.microsoft.com/library/security/MS14-063 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2998579 (Japanese) Severity: Important Fixlet ID: 1406311 Fixlet Link: http://technet.microsoft.com/library/security/MS14-063 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889864: Update for SharePoint Server 2013 - KB2889864 - SharePoint Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288986401 Fixlet Link: http://support.microsoft.com/kb/2889864 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Enterprise Server 2013 . This update provides the latest fixes to Microsoft SharePoint Enterprise Server 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2949927: Security Advisory: Availability of SHA-2 hashing algorithm for Windows 7 and Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 294992703 Fixlet Link: http://support.microsoft.com/kb/2949927 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2949927: Security Advisory: Availability of SHA-2 hashing algorithm for Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 294992705 Fixlet Link: http://support.microsoft.com/kb/2949927 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2949927: Security Advisory: Availability of SHA-2 hashing algorithm for Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 294992709 Fixlet Link: http://support.microsoft.com/kb/2949927 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2973501: Update to support RDP restricted administration for Windows 8 and Windows Server 2012 - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297350101 Fixlet Link: http://support.microsoft.com/kb/2973501 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2973501: Update to support RDP restricted administration for Windows 8 and Windows Server 2012 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 297350103 Fixlet Link: http://support.microsoft.com/kb/2973501 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2973501: Update to support RDP restricted administration for Windows 8 and Windows Server 2012 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297350105 Fixlet Link: http://support.microsoft.com/kb/2973501 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297729203 Fixlet Link: http://support.microsoft.com/kb/2977292 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297729207 Fixlet Link: http://support.microsoft.com/kb/2977292 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 297729209 Fixlet Link: http://support.microsoft.com/kb/2977292 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297729211 Fixlet Link: http://support.microsoft.com/kb/2977292 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297729213 Fixlet Link: http://support.microsoft.com/kb/2977292 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297729215 Fixlet Link: http://support.microsoft.com/kb/2977292 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 297729217 Fixlet Link: http://support.microsoft.com/kb/2977292 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 297729219 Fixlet Link: http://support.microsoft.com/kb/2977292 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297729221 Fixlet Link: http://support.microsoft.com/kb/2977292 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984972: Update for RDC 7.1 to support restricted administration logons on Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298497203 Fixlet Link: http://support.microsoft.com/kb/2984972 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984972: Update for RDC 7.1 to support restricted administration logons on Windows 7 and Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298497207 Fixlet Link: http://support.microsoft.com/kb/2984972 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984972: Update for RDC 7.1 to support restricted administration logons on Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 298497211 Fixlet Link: http://support.microsoft.com/kb/2984972 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984976: RDP 8.0 update for restricted administration on Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298497601 Fixlet Link: http://support.microsoft.com/kb/2984976 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984976: RDP 8.0 update for restricted administration on Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 298497603 Fixlet Link: http://support.microsoft.com/kb/2984976 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984976: RDP 8.0 update for restricted administration on Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298497605 Fixlet Link: http://support.microsoft.com/kb/2984976 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984981: RDC 8.1 update for restricted administration in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298498101 Fixlet Link: http://support.microsoft.com/kb/2984981 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984981: RDC 8.1 update for restricted administration in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 298498103 Fixlet Link: http://support.microsoft.com/kb/2984981 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984981: RDC 8.1 update for restricted administration in Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 298498105 Fixlet Link: http://support.microsoft.com/kb/2984981 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300123701 Fixlet Link: http://support.microsoft.com/kb/3001237 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300123703 Fixlet Link: http://support.microsoft.com/kb/3001237 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300123705 Fixlet Link: http://support.microsoft.com/kb/3001237 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300123707 Fixlet Link: http://support.microsoft.com/kb/3001237 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 300123709 Fixlet Link: http://support.microsoft.com/kb/3001237 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 300123711 Fixlet Link: http://support.microsoft.com/kb/3001237 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. From autonotify at us.ibm.com Mon Oct 20 02:34:07 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Mon, 20 Oct 2014 02:34:07 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201410200934.s9K9Y9fu027101@d03av05.boulder.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 610 Published: Fri, 17 Oct 2014 20:12:32 GMT New Fixlets: ============ *************************************************************** Title: 3009008: Security Advisory: Vulnerability in SSL 3.0 Could Allow Information Disclosure - Enable Workaround for IE Settings (Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 in Internet Explorer) (Japanese) Severity: N/A Fixlet ID: 300900803 Fixlet Link: https://technet.microsoft.com/library/security/3009008 Fixlet Description: Microsoft is aware of detailed information that has been published describing a new method to exploit a vulnerability in SSL 3.0. This is an industry-wide vulnerability affecting the SSL 3.0 protocol itself and is not specific to the Windows operating system. All supported versions of Microsoft Windows implement this protocol and are affected by this vulnerability. Microsoft is not aware of attacks that try to use the reported vulnerability at this time. Considering the attack scenario, this vulnerability is not considered high risk to customers. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs. *************************************************************** Title: 3009008: Security Advisory: Vulnerability in SSL 3.0 Could Allow Information Disclosure - Disable Workaround for IE Settings (Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 in Internet Explorer) (Japanese) Severity: N/A Fixlet ID: 300900805 Fixlet Link: https://technet.microsoft.com/library/security/3009008 Fixlet Description: Microsoft is aware of detailed information that has been published describing a new method to exploit a vulnerability in SSL 3.0. This is an industry-wide vulnerability affecting the SSL 3.0 protocol itself and is not specific to the Windows operating system. All supported versions of Microsoft Windows implement this protocol and are affected by this vulnerability. Microsoft is not aware of attacks that try to use the reported vulnerability at this time. Considering the attack scenario, this vulnerability is not considered high risk to customers. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs. *************************************************************** Title: 3009008: Security Advisory: Vulnerability in SSL 3.0 Could Allow Information Disclosure - Enable Workaround for Server Software (Disable SSL 3.0 in Windows) (Japanese) Severity: N/A Fixlet ID: 300900807 Fixlet Link: https://technet.microsoft.com/library/security/3009008 Fixlet Description: Microsoft is aware of detailed information that has been published describing a new method to exploit a vulnerability in SSL 3.0. This is an industry-wide vulnerability affecting the SSL 3.0 protocol itself and is not specific to the Windows operating system. All supported versions of Microsoft Windows implement this protocol and are affected by this vulnerability. Microsoft is not aware of attacks that try to use the reported vulnerability at this time. Considering the attack scenario, this vulnerability is not considered high risk to customers. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs. *************************************************************** Title: 3009008: Security Advisory: Vulnerability in SSL 3.0 Could Allow Information Disclosure - Disable Workaround for Server Software (Disable SSL 3.0 in Windows) (Japanese) Severity: N/A Fixlet ID: 300900809 Fixlet Link: https://technet.microsoft.com/library/security/3009008 Fixlet Description: Microsoft is aware of detailed information that has been published describing a new method to exploit a vulnerability in SSL 3.0. This is an industry-wide vulnerability affecting the SSL 3.0 protocol itself and is not specific to the Windows operating system. All supported versions of Microsoft Windows implement this protocol and are affected by this vulnerability. Microsoft is not aware of attacks that try to use the reported vulnerability at this time. Considering the attack scenario, this vulnerability is not considered high risk to customers. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs. From autonotify at us.ibm.com Sat Oct 25 02:34:09 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Sat, 25 Oct 2014 02:34:09 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201410250934.s9P9Y9on028608@d03av05.boulder.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 611 Published: Fri, 24 Oct 2014 09:23:52 GMT New Fixlets: ============ *************************************************************** Title: 3010060: Vulnerability in Microsoft OLE Could Allow Remote Code Execution - Enable OLE packager Shim Workaround - PowerPoint 2007 / PowerPoint 2010 / PowerPoint 2013 (Japanese) Severity: N/A Fixlet ID: 301006001 Fixlet Link: https://technet.microsoft.com/library/security/3010060 Fixlet Description: Microsoft is aware of a vulnerability affecting all supported releases of Microsoft Windows, excluding Windows Server 2003. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that contains an OLE object. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. The attack requires user interaction to succeed on Windows clients with a default configuration, as User Account Control (UAC) is enabled and a consent prompt is displayed. Applying the Microsoft Fix it solution, "OLE packager Shim Workaround", prevents exploitation of the vulnerability.Note: Affected computers may report back as 'Pending Restart' once the update has run successfully, but will not report back their final status until the computer has been restarted. *************************************************************** Title: 3010060: Vulnerability in Microsoft OLE Could Allow Remote Code Execution - Disable OLE packager Shim Workaround - PowerPoint 2007 / PowerPoint 2010 / PowerPoint 2013 (Japanese) Severity: N/A Fixlet ID: 301006003 Fixlet Link: https://technet.microsoft.com/library/security/3010060 Fixlet Description: Microsoft is aware of a vulnerability affecting all supported releases of Microsoft Windows, excluding Windows Server 2003. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that contains an OLE object. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. The attack requires user interaction to succeed on Windows clients with a default configuration, as User Account Control (UAC) is enabled and a consent prompt is displayed. Applying the Microsoft Fix it solution, "OLE packager Shim Workaround", prevents exploitation of the vulnerability.Note: Affected computers may report back as 'Pending Restart' once the update has run successfully, but will not report back their final status until the computer has been restarted. From autonotify at us.ibm.com Fri Oct 31 02:34:00 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Fri, 31 Oct 2014 02:34:00 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201410310934.s9V9Y1rm023207@d03av05.boulder.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 612 Published: Fri, 31 Oct 2014 07:20:08 GMT New Fixlets: ============ *************************************************************** Title: 2760371: Update for Office 2013 - KB2760371 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 276037101 Fixlet Link: http://support.microsoft.com/kb/2760371 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2760371: Update for Office 2013 - KB2760371 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 276037103 Fixlet Link: http://support.microsoft.com/kb/2760371 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837582: Update for Office 2010 - KB2837582 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 283758201 Fixlet Link: http://support.microsoft.com/kb/2837582 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837582: Update for Office 2010 - KB2837582 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 283758203 Fixlet Link: http://support.microsoft.com/kb/2837582 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2881004:Update for Office 2013 - KB2881004 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 288100401 Fixlet Link: http://support.microsoft.com/kb/2881004 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2881004:Update for Office 2013 - KB2881004 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288100403 Fixlet Link: http://support.microsoft.com/kb/2881004 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2881010: Update for Audit and Control Management Server 2013 (Japanese) Severity: N/A Fixlet ID: 288101001 Fixlet Link: http://support.microsoft.com/kb/2881010 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 . This update provides the latest fixes to Microsoft Office 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2881012: Update for Office 2013 - KB2881012 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288101201 Fixlet Link: http://support.microsoft.com/kb/2881012 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2881012: Update for Office 2013 - KB2881012 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 288101203 Fixlet Link: http://support.microsoft.com/kb/2881012 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2883059: Update for OneNote 2013 -KB2883059 - OneNote2013 (Japanese) Severity: N/A Fixlet ID: 288305901 Fixlet Link: http://support.microsoft.com/kb/2883059 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 32-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2883059: Update for OneNote 2013 -KB2883059 - OneNote2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288305903 Fixlet Link: http://support.microsoft.com/kb/2883059 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 64-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2883095: Update for Office 2013 - KB2883095 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 288309501 Fixlet Link: http://support.microsoft.com/kb/2883095 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2883095: Update for Office 2013 - KB2883095 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288309503 Fixlet Link: http://support.microsoft.com/kb/2883095 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889927: Update for Office 2013 - KB2889927 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 288992701 Fixlet Link: http://support.microsoft.com/kb/2889927 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889927: Update for Office 2013 - KB2889927 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288992703 Fixlet Link: http://support.microsoft.com/kb/2889927 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889928: Update for Visio 2013 - KB2889928 - Visio 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288992801 Fixlet Link: http://support.microsoft.com/kb/2889928 Fixlet Description: Microsoft has released an update for Microsoft Visio 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Visio 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889928: Update for Visio 2013 - KB2889928 - Visio 2013 (Japanese) Severity: N/A Fixlet ID: 288992803 Fixlet Link: http://support.microsoft.com/kb/2889928 Fixlet Description: Microsoft has released an update for Microsoft Visio 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Visio 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889929: Update for Lync 2013 - KB2889929 - Lync 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288992903 Fixlet Link: http://support.microsoft.com/kb/2889929 Fixlet Description: Microsoft has released an update for Microsoft Lync 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Lync 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2889929: Update for Lync 2013 - KB2889929 - Lync 2013 (Japanese) Severity: N/A Fixlet ID: 288992911 Fixlet Link: http://support.microsoft.com/kb/2889929 Fixlet Description: Microsoft has released an update for Microsoft Lync 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Lync 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2889930: Update for SharePoint Server 2013 - KB2889930 - SharePoint Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288993001 Fixlet Link: http://support.microsoft.com/kb/2889930 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Enterprise Server 2013 . This update provides the latest fixes to Microsoft SharePoint Enterprise Server 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889937: Update for SharePoint Server 2013 - KB2889937 - SharePoint Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288993701 Fixlet Link: http://support.microsoft.com/kb/2889937 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Enterprise Server 2013 . This update provides the latest fixes to Microsoft SharePoint Enterprise Server 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889939: Update for Word 2013 - KB2889939 - Word 2013 (Japanese) Severity: N/A Fixlet ID: 288993901 Fixlet Link: http://support.microsoft.com/kb/2889939 Fixlet Description: Microsoft has released an update for Microsoft Word 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Word 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889939: Update for Word 2013 - KB2889939 - Word 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288993903 Fixlet Link: http://support.microsoft.com/kb/2889939 Fixlet Description: Microsoft has released an update for Microsoft Word 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Word 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889940: Update for Office 2013 - KB2889940 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288994001 Fixlet Link: http://support.microsoft.com/kb/2889940 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889940: Update for Office 2013 - KB2889940 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 288994003 Fixlet Link: http://support.microsoft.com/kb/2889940 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889941: Update for Excel 2013 - KB2889941 - Excel 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288994101 Fixlet Link: http://support.microsoft.com/kb/2889941 Fixlet Description: Microsoft has released an update for Microsoft Excel 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Excel 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889941: Update for Excel 2013 - KB2889941 - Excel 2013 (Japanese) Severity: N/A Fixlet ID: 288994103 Fixlet Link: http://support.microsoft.com/kb/2889941 Fixlet Description: Microsoft has released an update for Microsoft Excel 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Excel 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889942: Update for Office 2013 - KB2889942 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 288994201 Fixlet Link: http://support.microsoft.com/kb/2889942 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889942: Update for Office 2013 - KB2889942 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288994203 Fixlet Link: http://support.microsoft.com/kb/2889942 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889943: Update for SharePoint Foundation 2013 - KB2889943 - Sharepoint Foundation 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288994301 Fixlet Link: http://support.microsoft.com/kb/2889943 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Foundation 2013 . This update provides the latest fixes to Microsoft SharePoint Foundation 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899475: Update 2899475 for Outlook 2007 Junk Email Filter - Outlook 2007 (Japanese) Severity: N/A Fixlet ID: 289947501 Fixlet Link: http://support.microsoft.com/kb/2899475 Fixlet Description: This update provides the Junk E-mail Filter in Microsoft Office Outlook 2007 Junk Email Filter with a more current definition of which e-mail messages should be considered junk e-mail. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2926248: Exchange Server 2013 Service Pack 1 Available (Japanese) Severity: N/A Fixlet ID: 292624801 Fixlet Link: http://support.microsoft.com/kb/2926248 Fixlet Description: Service Pack 1 for Exhchange Server 2013 64-Bit Edition contains new updates. Important Note: Due to the complexity of the installation, this update must be completed manually. *************************************************************** Title: 2970228: Update to support the new currency symbol for the Russian ruble in Windows - KB2970228 - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297022805 Fixlet Link: http://support.microsoft.com/kb/2970228 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2970228: Update to support the new currency symbol for the Russian ruble in Windows - KB2993651 - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297022807 Fixlet Link: http://support.microsoft.com/kb/2970228 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2970228: Update to support the new currency symbol for the Russian ruble in Windows - KB2970228 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 297022809 Fixlet Link: http://support.microsoft.com/kb/2970228 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2970228: Update to support the new currency symbol for the Russian ruble in Windows - KB2993651 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 297022811 Fixlet Link: http://support.microsoft.com/kb/2970228 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2970228: Update to support the new currency symbol for the Russian ruble in Windows - KB2970228 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297022813 Fixlet Link: http://support.microsoft.com/kb/2970228 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2970228: Update to support the new currency symbol for the Russian ruble in Windows - KB2993651 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 297022815 Fixlet Link: http://support.microsoft.com/kb/2970228 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2975331: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - KB2975331 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 297533110 Fixlet Link: http://support.microsoft.com/kb/2975331 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2975331: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - KB2993651 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 297533112 Fixlet Link: http://support.microsoft.com/kb/2975331 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2977174 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 298400601 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2984006 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 298400603 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2994897 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 298400605 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2995004 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 298400607 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2977174 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298400609 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2984006 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298400611 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2994897 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298400613 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2995004 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298400615 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2977174 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298400617 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2984006 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298400619 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2994897 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298400621 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2984006: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2995004 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298400623 Fixlet Link: http://support.microsoft.com/kb/2984006 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2986204: Update for Outlook 2013 - KB2986204 - Outlook 2013 (Japanese) Severity: N/A Fixlet ID: 298620401 Fixlet Link: http://support.microsoft.com/kb/2986204 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2986204: Update for Outlook 2013 - KB2986204 - Outlook 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 298620403 Fixlet Link: http://support.microsoft.com/kb/2986204 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2989542: Windows Store apps are not updated automatically in Windows 8.1 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298954201 Fixlet Link: http://support.microsoft.com/kb/2989542 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2989542: Windows Store apps are not updated automatically in Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 298954203 Fixlet Link: http://support.microsoft.com/kb/2989542 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2989542: Windows Store apps are not updated automatically in Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 298954205 Fixlet Link: http://support.microsoft.com/kb/2989542 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2994023: RPD 8.1 client for Windows 7 or Windows Server 2008 R2 disconnects when it is connected through a RD gateway - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 299402301 Fixlet Link: http://support.microsoft.com/kb/2994023 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2994023: RPD 8.1 client for Windows 7 or Windows Server 2008 R2 disconnects when it is connected through a RD gateway - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 299402303 Fixlet Link: http://support.microsoft.com/kb/2994023 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2994023: RPD 8.1 client for Windows 7 or Windows Server 2008 R2 disconnects when it is connected through a RD gateway - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 299402305 Fixlet Link: http://support.microsoft.com/kb/2994023 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995387: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299538701 Fixlet Link: http://support.microsoft.com/kb/2995387 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995387: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 299538703 Fixlet Link: http://support.microsoft.com/kb/2995387 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995387: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299538705 Fixlet Link: http://support.microsoft.com/kb/2995387 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995388: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299538801 Fixlet Link: http://support.microsoft.com/kb/2995388 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995388: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2996799 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299538803 Fixlet Link: http://support.microsoft.com/kb/2995388 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995388: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299538805 Fixlet Link: http://support.microsoft.com/kb/2995388 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995388: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2996799 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299538807 Fixlet Link: http://support.microsoft.com/kb/2995388 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995388: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 299538809 Fixlet Link: http://support.microsoft.com/kb/2995388 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995388: Update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - KB2996799 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 299538811 Fixlet Link: http://support.microsoft.com/kb/2995388 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2998174: Active camera is switched unexpectedly when you review photos in Camera app in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 299817401 Fixlet Link: http://support.microsoft.com/kb/2998174 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2998174: Active camera is switched unexpectedly when you review photos in Camera app in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299817403 Fixlet Link: http://support.microsoft.com/kb/2998174 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2998174: Active camera is switched unexpectedly when you review photos in Camera app in Windows 8.1 or Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299817405 Fixlet Link: http://support.microsoft.com/kb/2998174 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2998812: Compatibility update for Windows 7 or Windows Server 2008 R2 - Windows 7 Gold (Japanese) Severity: N/A Fixlet ID: 299881201 Fixlet Link: http://support.microsoft.com/kb/2998812 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2998812: Compatibility update for Windows 7 or Windows Server 2008 R2 - Windows 7 Gold / Windows Server 2008 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 299881203 Fixlet Link: http://support.microsoft.com/kb/2998812 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000731: Update for OneDrive for Business - KB3000731 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 300073101 Fixlet Link: http://support.microsoft.com/kb/3000731 Fixlet Description: Microsoft has released an update for Microsoft OneDrive for Business 64-Bit Edition. This update provides the latest fixes to Microsoft OneDrive for Business 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000731: Update for OneDrive for Business - KB3000731 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 300073103 Fixlet Link: http://support.microsoft.com/kb/3000731 Fixlet Description: Microsoft has released an update for Microsoft OneDrive for Business 32-Bit Edition. This update provides the latest fixes to Microsoft OneDrive for Business 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300098803 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300098805 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 300098809 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300098811 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 300098813 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300098815 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 300098817 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 300098819 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 300098821 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3005628: Update for the .NET Framework 3.5 on Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 300562801 Fixlet Link: http://support.microsoft.com/kb/3005628 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3005628: Update for the .NET Framework 3.5 on Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 300562803 Fixlet Link: http://support.microsoft.com/kb/3005628 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3005628: Update for the .NET Framework 3.5 on Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2 - Windows 8 Gold / Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300562805 Fixlet Link: http://support.microsoft.com/kb/3005628 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3005628: Update for the .NET Framework 3.5 on Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2 - Windows 8.1 Gold / Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300562807 Fixlet Link: http://support.microsoft.com/kb/3005628 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.